Library

Video Player is loading.
 
Current Time 0:00
Duration 4:16
Loaded: 0%
 
x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:00

    Hello world, North Korea has a new ransomware operation, and it's raising money to help

  • 00:04

    "close the gap between the rich and poor" by "help[ing] the poor and starving people".

  • 00:09

    The ransomware victims get something out of it too, sure you'll have to shell out a few

  • 00:13

    bitcoin for your files to be decrypted, but you get the added benefit of "increasing your

  • 00:17

    security awareness".

  • 00:19

    I'm not making this up... this is "HolyGhost's" dark web site, they're a ransomware group,

  • 00:24

    recently attributed to North Korea by Microsoft's "threat intelligence center".

  • 00:28

    I can't imagine what was running through the mind of whoever typed up "HolyGhost's" homepage,

  • 00:32

    how they managed to convince themselves that this low effort Robin Hood larp was anything

  • 00:36

    other than embarrassing, and obviously not convincing anyone.

  • 00:40

    The last line in particular cracks me up, that they're doing this "To increase your

  • 00:43

    security awareness" - that's like a murderer killing someone and then justifying it by

  • 00:47

    saying they only wanted to raise awareness of the threat murderers pose.

  • 00:51

    It's so silly, that surely this is just some parody and can't actually be the work of the

  • 00:55

    same North Koreans that successfully pull of crypto heists worth hundreds of millions

  • 01:00

    of dollars.

  • 01:01

    Well, according to Microsoft, there are some key indicators that "H0lyGh0st" otherwise

  • 01:06

    known as "DEV-0530" is run by North Korean government hackers, because they "[have] connections

  • 01:12

    with another North Korean-based group, tracked as PLUTONIUM", these connections include operating

  • 01:17

    from the same infrastructure as well as "using tools created exclusively by PLUTONIUM" which

  • 01:22

    aren't publicly available.

  • 01:24

    Also, in order determine HolyGhost's geographical location Microsoft analysed the time of day

  • 01:29

    that the group is generally active, or as they put it a "temporal analysis", Microsoft

  • 01:35

    found that HolyGhost's activity is consistent with North Korea's timezone.

  • 01:40

    If this is the work of North Korean state backed hackers, it wouldn't be their first

  • 01:44

    ransomware operation - however there is a more interesting theory... that this isn't

  • 01:48

    supported by the North Korean government per se.

  • 01:51

    But rather a kind of side hustle for North Korean government hackers, a personal project,

  • 01:56

    for their own financial gain.

  • 01:58

    The reasoning for this is, "the attackers frequently asked victims for anywhere from

  • 02:03

    1.2 to 5 Bitcoins."

  • 02:05

    but they were willing to negotiate and "in some cases, lowered the price to less than

  • 02:08

    one-third of the initial asking price."

  • 02:11

    - now this amount of money is nothing compared to North Korea's government operations which

  • 02:15

    can net hundreds of millions of dollars.

  • 02:17

    Also, "HolyGhost" targets small to medium sized businesses, whereas North Korea's government

  • 02:23

    backed hacks typically go after a much broader set of victims.

  • 02:27

    All this points to an operation run by people with access to the same tools, but not with

  • 02:31

    the same time, effort and resources as those government sponsored attacks.

  • 02:36

    Also, if you're wondering why I'm having to use the low resolution screenshots from Microsoft's

  • 02:40

    report, that's because the group's onion site has vanished in the last few days, interesting

  • 02:45

    timing given that coincided with Microsoft publishing their report - it could of course

  • 02:50

    just be a coincidence, but if this operation was the side hustle of North Korean hackers,

  • 02:55

    the report might have spooked them into abandoning ship before their superiors found out.

  • 03:00

    Next up, it's not often that being a victim of a hack actually makes you money.

  • 03:04

    But this is one of those strange rare occasions... in which a Dutch university managed to make

  • 03:08

    €300 thousand Euros from being a victim of a ransomware attack.

  • 03:13

    So in 2019, a ransomware gang gave Maastricht university in the Netherlands an early Christmas

  • 03:18

    present when on the 23rd of December hundreds of the university's computers were infected

  • 03:23

    with Clop Ransomware, not only that but many of the university's backups were also affected

  • 03:28

    - because... they weren't properly segregated the university's network.

  • 03:32

    As usual the source of the attack was a phishing email opened by an unwitting employee.

  • 03:37

    Being a victim of a ransomware attack is a headache at the best of times, but it was

  • 03:41

    made even worse due to the university's research being encrypted as well as impending exams.

  • 03:47

    So, about a week after the ransomware struck, the decision was made to pay the ransom, of

  • 03:52

    30 bitcoin, which at the time was roughly equivalent to €200 thousand euros.

  • 03:58

    And that was where the story ended - until earlier this month when there was a "remarkable

  • 04:03

    development" - turns out that Dutch authorities managed to trace the payment to hackers in

  • 04:07

    Ukraine - which shouldn't come as much of a surprise given that cyber criminals tend

  • 04:11

    to base themselves in ex soviet countries as the law enforcement in those countries

  • 04:15

    generally don't cooperate with Western intelligence.

  • 04:18

    Ukraine though, is obviously, one big exception.

  • 04:21

    And so, with the help of Ukrainians authorities, the cyber criminals were identified as belonging

  • 04:26

    to the gang "SectorJ04" - which eventually led to the entire trove of 30 bitcoins being

  • 04:32

    retrieved.

  • 04:33

    And this is where the money making comes in - the university bought the bitcoin in early

  • 04:38

    2020, for roughly 10k USD per coin, since then the price has a little bit more than

  • 04:42

    doubled, leaving them €300 thousand euros in profit.

  • 04:47

    Sadly though, they missed bitcoin's all time high, if the coins were retrieved just a few

  • 04:51

    months earlier they would be worth well over a million euros.

  • 04:55

    Since the recovery, the university has said they'll use the gains to help students in

  • 04:58

    need - so I guess this is a bit of a happy ending.

  • 05:01

    Though it's not a complete W, as the recovered funds are no where near enough to cover the

  • 05:06

    cost of the damages the university incurred during the actual hack - this will have included

  • 05:11

    staff working overtime, and flying in recovery specialists to work on site to help resolve

  • 05:15

    the issue.

  • 05:16

    In fact, according to Sophos, whilst the average ransom demanded from companies is $170 thousand

  • 05:23

    dollars, extra costs due to downtime averages at $1.85 million dollars - so in reality the

  • 05:29

    ransom payment itself is almost insignificant when compared to just how much disruption

  • 05:33

    ransomware attacks generally cause.

  • 05:35

    Next up, an ex-CIA employee has been convicted of leaking top secret documents to wikileaks,

  • 05:41

    these eventually became known as the vault 7 leaks.

  • 05:44

    It's been a while since the vault 7 leaks were published, roughly 5 years - it's easy

  • 05:49

    to forget just how enormous a news story this was at the time.

  • 05:52

    It was arguably the biggest leak in CIA history, with wikileaks claiming it exposed "the entire

  • 05:57

    hacking capacity of the CIA".

  • 05:59

    To give you a quick reminder, vault 7 uncovered how the "CIA 'hoarded' [zero day vulnerabilities],

  • 06:05

    some of these affecting IOS and Android" - the leaks also described "techniques [permitting]

  • 06:10

    the CIA to bypass the encryption of WhatsApp, Signal, [and] Telegram".

  • 06:14

    Vault 7 also brought to light some of the CIA's creepier projects, including an attack

  • 06:19

    called "weeping angel", it was developed in collaboration with UK intelligence and targeted

  • 06:24

    Samsung smart TVs, the attack "places the target TV in a 'Fake-Off' mode, so that the

  • 06:30

    owner falsely believes the TV is off when it is on.

  • 06:33

    In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending

  • 06:38

    them over the Internet to a covert CIA server."

  • 06:42

    But this is just a taster of what vault 7 included, in total, hundreds of millions of

  • 06:46

    lines of code were exposed, it was really quite extraordinary.

  • 06:50

    However, eventually an ex CIA employee "Joshua Schulte" became suspected of being the source

  • 06:56

    of the leak.

  • 06:57

    And this is where things take a darker turn from just espionage, so after the FBI accessed

  • 07:03

    his computer and it's encrypted contents, which was made pretty easy as Shulte was fond

  • 07:08

    of reusing passwords - they apparently found "over 10,000 images and videos of [cp]", - so,

  • 07:15

    if you were wondering why you haven't heard this guy being revered by pro privacy people,

  • 07:19

    as someone like Edward Snowden might be, you now know why.

  • 07:23

    The charges for the images found on his computer are still pending, but when it comes to the

  • 07:28

    Vault 7 leaks, just a couple days ago "Schulte was found guilty of nine charges" and is facing

  • 07:33

    more than 80 years in prison.

  • 07:35

    And if you're confused why it's taken more than 5 years to come to a conclusion on this,

  • 07:39

    the latest trial is actually a retrial.

  • 07:41

    The first trial ended in 2020 with a hung jury.

  • 07:45

    This video was made possible by Linode, who are giving you a $100 60-day credit just for

  • 07:50

    signing up.

  • 07:51

    Linode is essentially your swiss army knife for cloud computing, if it runs on linux it'll

  • 07:55

    run on Linode.

  • 07:56

    One great feature of Linode is their app marketplace which makes it super easy to spin up servers

  • 08:01

    with preconfigured software.

  • 08:03

    For example, use Linode's pi-hole app to set up a DNS sinkhole, that you can use to block

  • 08:08

    ads across all your devices - and yes I recognise the irony in promoting ad blocking within

  • 08:13

    an ad!

  • 08:15

    Linode can run almost anything, by providing all the tools a developer really needs at

  • 08:18

    competitive prices.

  • 08:20

    Use the link in the description now to claim your free $100.

  • 08:25

    As always sources can be found in the video description, stay tuned for more hacking videos

  • 08:29

    and have a good one.

All

The example sentences of DECRYPTED in videos (2 in total of 2)

bitcoin proper noun, singular for preposition or subordinating conjunction your possessive pronoun files noun, plural to to be verb, base form decrypted verb, past participle , but coordinating conjunction you personal pronoun get verb, non-3rd person singular present the determiner added verb, past participle benefit noun, singular or mass of preposition or subordinating conjunction " increasing verb, gerund or present participle your possessive pronoun
great proper noun, singular cipher proper noun, singular of preposition or subordinating conjunction louis proper noun, singular xiv verb, non-3rd person singular present , which wh-determiner was verb, past tense decrypted verb, past participle by preposition or subordinating conjunction etienne proper noun, singular bazeries proper noun, singular of preposition or subordinating conjunction the determiner french proper noun, singular army proper noun, singular s proper noun, singular

Definition and meaning of DECRYPTED

What does "decrypted mean?"

/dēˈkript/

verb
.